Key generation, storage, and distribution are always critical aspects of a key management system. Here is how our key management system works:
Our key generation procedures are designed to protect against loss, theft and compromise.
We use the maximum key length possible – 256 bits.
Our key management design forces secure distribution of the encryption keys.
We store the encryption keys in a secure key locker appliance. The appliance can be deployed on-premises or within our cloud.
The encryption keys can be rotated without having to decrypt the encrypted data sets.
The Server General Security Officer is able to revoke encryption keys at any time.
Access to encryption keys is restricted to the fewest number of custodians necessary.